EP2713547A1 - Zugangssteuerungsverfahren für medienressourcen und vorrichtung - Google Patents

Zugangssteuerungsverfahren für medienressourcen und vorrichtung Download PDF

Info

Publication number
EP2713547A1
EP2713547A1 EP12811616.7A EP12811616A EP2713547A1 EP 2713547 A1 EP2713547 A1 EP 2713547A1 EP 12811616 A EP12811616 A EP 12811616A EP 2713547 A1 EP2713547 A1 EP 2713547A1
Authority
EP
European Patent Office
Prior art keywords
media resource
control point
media
upnp
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP12811616.7A
Other languages
English (en)
French (fr)
Other versions
EP2713547A4 (de
EP2713547B1 (de
Inventor
Zhenwei Shan
Huangwei Wu
Yu Zhu
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Device Shenzhen Co Ltd
Original Assignee
Huawei Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Device Co Ltd filed Critical Huawei Device Co Ltd
Publication of EP2713547A1 publication Critical patent/EP2713547A1/de
Publication of EP2713547A4 publication Critical patent/EP2713547A4/de
Application granted granted Critical
Publication of EP2713547B1 publication Critical patent/EP2713547B1/de
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • H04L65/61Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio
    • H04L65/613Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for the control of the source by the destination
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2807Exchanging configuration information on appliance services in a home automation network
    • H04L12/2812Exchanging configuration information on appliance services in a home automation network describing content present in a home automation network, e.g. audio video content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1069Session establishment or de-establishment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • H04L65/61Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio
    • H04L65/612Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for unicast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party

Definitions

  • Embodiments of the present invention relate to communications technologies, and in particular, to a media resource access control method and device.
  • a universal plug and play (Universal Plug and Play; UPnP for short)/digital living network alliance (Digital Living Network Alliance; DLNA for short) standard has implemented media sharing applications on a home network, where the standard defines three entities, respectively: a media renderer (Media Renderer), a media server (Media Server), and a control point (Control Point). Specifically, the control point queries media server for media resource information, where between the control point and the media server is under device protection (Device Protection; DP for short).
  • the media server When the control point has permission to access the media server, the media server returns information such as a uniform resource identifier (Uniform Resource Identifier; URI for short) list to the control point, and then the control point selects a URI and sends it to the media renderer, and lastly, the media renderer requests from the media server a media resource indicated by the URI, and plays the media resource.
  • a uniform resource identifier Uniform Resource Identifier; URI for short
  • control points may guess or intercept a URI on the media server and then easily steal a protected media resource on the media server.
  • Embodiments of the present invention provide a media resource access control method and device, so as to overcome a defect in the prior art that other control points may guess or intercept a URI on a media server and may easily steal a protected media resource on the media server, thereby ensuring media resource security.
  • An embodiment of the present invention provides a media resource access control method, including:
  • An embodiment of the present invention further provides a media resource access control method, including:
  • An embodiment of the present invention further provides a media resource access control method, including:
  • An embodiment of the present invention further provides a media resource access control method, including:
  • An embodiment of the present invention provides a UPnP media server, including:
  • An embodiment of the present invention provides a UPnP media player, including:
  • An embodiment of the present invention provides a control point, including:
  • An embodiment of the present invention provides a UPnP media server, including:
  • a UPnP media server receives a media resource identifier sent by a control point and acquires preset verification information corresponding to the media resource identifier; receives a media resource acquisition request sent by a UPnP media player, where the media resource acquisition request contains to-be-verified information; and verifies the to-be-verified information by using the preset verification information, and if the verification is passed, sends a media resource corresponding to the media resource identifier to the UPnP media server, which overcomes a defect that in the prior art that other control points may guess or intercept a URI on a media server and may easily steal a protected media resource on the media server, thereby ensuring media resource security.
  • FIG. 1 is a flowchart of an embodiment of a media resource access control method according to the present invention. As shown in FIG. 1 , the method of this embodiment includes the following.
  • Step 101 A UPnP media server receives a media resource identifier sent by a control point and acquires preset verification information corresponding to the media resource identifier.
  • the content directory service of the media server is protected by a device protection, that is, a security channel is established between the control point and the media server, where the security channel is a secure sockets layer (Secure Sockets Layer; SSL for short)/transport layer security (Transport Layer Security; TLS for short) security channel.
  • a security channel is established between the control point and the media server, where the security channel is a secure sockets layer (Secure Sockets Layer; SSL for short)/transport layer security (Transport Layer Security; TLS for short) security channel.
  • SSL Secure Sockets Layer
  • TLS Transport Layer Security
  • the control point sends a media resource browse request or a media resource query request through the security channel to the UPnP media server, and the UPnP media server may verify whether the control point has access permission, and if it has the access permission, media resource information corresponding to the control point returned by the media server is received through the security channel, so that the control point selects a media resource identifier from the media resource information, where the media resource identifier may specifically be a media resource content identifier and/or a URI.
  • Step 102 The UPnP media server receives a media resource acquisition request sent by a UPnP media player, where the media resource acquisition request contains to-be-verified information.
  • Step 103 The UPnP media server verifies the to-be-verified information by using the preset verification information, and if the verification is passed, sends a media resource corresponding to the media resource identifier to the UPnP media player.
  • a UPnP media server receives a media resource identifier sent by a control point and acquires preset verification information corresponding to the media resource identifier; receives a media resource acquisition request sent by a UPnP media player, where the media resource acquisition request contains to-be-verified information; and verifies the to-be-verified information by using the preset verification information, and if the verification is passed, sends a media resource corresponding to the media resource identifier to the UPnP media server, which overcomes a defect that in the prior art that other control points may guess or intercept a URI on a media server and may easily steal a protected media resource on the media server, thereby ensuring media resource security.
  • the specific implementation manner of acquiring preset verification information corresponding to the media resource identifier in step 101 may include the following three types:
  • the UPnP media server receives the media resource identifier sent by the control point and determines whether the control point has permission to access the media resource corresponding to the media resource identifier; and if it is determined that the control point has the permission to access the media resource corresponding to the media resource identifier, generates a password and sets the password and the media resource identifier as preset verification information.
  • the UPnP media server receives the media resource identifier and a UPnP media player identifier that are sent by the control point and determines whether the control point has permission to access the media resource corresponding to the media resource identifier; and if it is determined that the control point has the permission to access the media resource corresponding to the media resource identifier, sets the UPnP media player identifier and the media resource identifier as preset verification information.
  • the UPnP media server receives the media resource identifier and a password that are sent by the control point and determines whether the control point has permission to access the media resource corresponding to the media resource identifier, where the password is a password generated by the control point; and if it is determined that the control point has the permission to access the media resource corresponding to the media resource identifier, sets the password and the media resource identifier as preset verification information.
  • the control point selects a media resource content identifier from the media resource information and sends the media resource content identifier to the UPnP media server, and the to-be-verified information contains a URI
  • the specific implementation manner of verifying, by the UPnP media server, the to-be-verified information by using the preset verification information in step 103 may be:
  • FIG. 2 is a flowchart of another embodiment of a media resource access control method according to the present invention. As shown in FIG. 2 , the method of this embodiment includes the following.
  • Step 201 A UPnP media player acquires to-be-verified information.
  • Step 202 The UPnP media player sends a media resource acquisition request carrying the to-be-verified information to a UPnP media server, so that the UPnP media server verifies the to-be-verified information by using preset verification information.
  • the method for the UPnP media server to set the preset verification information is the same as the foregoing method for the UPnP media server to obtain the preset verification information, and the UPnP media server may further implement the technical solution of the method embodiment as shown in FIG. 1 , an implementation principle of which is similar and is not described herein again.
  • a UPnP media player acquires to-be-verified information and sends a media resource acquisition request carrying the to-be-verified information to a UPnP media server, so that the UPnP media server verifies the to-be-verified information by using preset verification information, which overcomes the defect in the prior art that other control points may guess or intercept a URI on the media server and may easily steal a protected media resource on the media server, thereby ensuring media resource security.
  • the method may further include:
  • the security channel may be an SSL or a TLs.
  • the UPnP media player may bind the control point and the current play behavior, for instance: the UPnP media player binds the control point identifier corresponding to the control point and an AVTransportID that indicates a current play behavior, and the control point may control the UPnP media player through the AVTransportID, such as stop or fast-forward.
  • the control point may control the UPnP media player through the AVTransportID, such as stop or fast-forward.
  • step 201 may include the following types.
  • the UPnP media player receives, through the security channel, a URI and a password that are sent by the control point and sets the URI and the password as the to-be-verified information.
  • the control point sends a media resource browse request or a media resource query request to the UPnP media server through the security channel established between the control point and the UPnP media server; the UPnP media server may verify whether the control point has access permission, and if it has the access permission, media resource information corresponding to the control point returned by the media server is received through the security channel, so that the control point selects a media resource identifier from the media resource information, generates a password, and then sends the media resource identifier and the password to the UPnP media server; and the UPnP media server determines that the control point has the permission to access the media resource corresponding to the media resource identifier, and if it is determined that the control point has the permission to access the media resource corresponding to the media resource identifier, returns a permission pass message such as an "OK" message to the control point, and accordingly the control point establishes a security channel with the UPnP media player and sends the URI selected from the media resource information and the generated
  • the control point sends a media resource browse request or a media resource query request to the UPnP media server through the security channel established between the control point and the UPnP media server; the UPnP media server may verify whether the control point has access permission, and if it has the access permission, media resource information corresponding to the control point returned by the media server is received through the security channel, so that the control point selects a media resource identifier from the media resource information, and then sends the media resource identifier to the UPnP media server; and the UPnP media server determines whether the control point has the permission to access the media resource corresponding to the media resource identifier, and if it is determined that the control point has the permission to access the media resource corresponding to the media resource identifier, generates a password and returns a permission pass message such as an "OK" message to the control point, where the message includes the password generated by the UPnP media server, and accordingly the control point establishes a security channel with the UPnP media player and sends
  • the UPnP media player receives, through the security channel, the URI sent by the control point and sets the UPnP media player identifier corresponding to the UPnP media player and the URI as the to-be-verified information.
  • the control point sends a media resource browse request or a media resource query request to the UPnP media server through the security channel established between the control point and the UPnP media server; the UPnP media server may verify whether the control point has access permission, and if it has the access permission, media resource information corresponding to the control point returned by the media server is received through the security channel, so that the control point selects a media resource identifier from the media resource information and select a UPnP media player identifier and then send the media resource identifier and the UPnP media player identifier to the UPnP media server; and the UPnP media server determines whether the control point has the permission to access the media resource corresponding to the media resource identifier, and if it is determined that the control point has the permission to access the media resource corresponding to the media resource identifier, returns a permission pass message such as an "OK" message to the control point, and accordingly the control point establishes a security channel with the UPnP media player and send
  • the UPnP media player receives, through the security channel, a first character string sent by the control point, where the first character string includes a URI of a media resource acquired by the control point from the UPnP media server, a random number generated by the control point, a control point identifier, and a second character string, where the second character string is a character string acquired by performing a hash algorithm on the URI, the random number, and the control point identifier and encrypting a character string acquired by the hash algorithm by using a private key.
  • the control point sends a media resource browse request or a media resource query request to the UPnP media server through the security channel established between the control point and the UPnP media server; the UPnP media server may verify whether the control point has access permission, and if it has the access permission, media resource information corresponding to the control point returned by the media server is received through the security channel, so that the control point selects a URI from the media resource information and generates a random number (nouce), and then performs a hash algorithm on the URI, the control point identifier corresponding to the control point, and the random number and encrypts a character string acquired by the hash algorithm by using a preset private key to obtain the second character string and combines the URI, the random number, the control point identifier, and the second character string to form the first character string, and then the control point establishes a security channel with the UPnP media player and sends the first character string to the UPnP media player, for instance: the control point may send
  • FIG. 3 is a flowchart of still another embodiment of a media resource access control method according to the present invention. As shown in FIG. 3 , the method of this embodiment includes the following.
  • Step 301 A control point sends a media resource browse or query request to a UPnP media server and receives media resource information returned by the UPnP media server.
  • Step 302 The control point selects a URI from the media resource information and generates a random number.
  • Step 303 The control point performs a hash algorithm on the URI, the random number, and a control point identifier of the control point and encrypts a character string acquired by the hash algorithm by using a private key to obtain a second character string.
  • Step 304 The control point combines the URI, the random number, the control point identifier, and the second character string to obtain a first character string and sends the first character string to the UPnP media player so that the UPnP media player uses the first character string as to-be-verified information.
  • the control point sends a media resource browse request or a media resource query request to the UPnP media server through the security channel established between the control point and the UPnP media server; the UPnP media server may verify whether the control point has access permission, and if it has the access permission, media resource information corresponding to the control point returned by the media server is received through the security channel, so that the control point selects a URI from the media resource information and generates a random number (nouce), and then performs a hash algorithm on the URI, the control point identifier corresponding to the control point, and the random number and encrypts a character string acquired by the hash algorithm by using a preset private key to obtain the second character string and combines the URI, the random number, the control point identifier, and the second character string to form the first character string, and then the control point establishes a security channel with the UPnP media player and sends the first character string to the UPnP media player, for instance: the control point may send
  • a control point sends a media resource browse request or a media resource query request to a UPnP media server and receives media resource information returned by the UPnP media server; selects a URI from the media resource information and generates a random number; performs a hash algorithm on the URI, the random number, and the control point identifier and encrypts a character string acquired by the hash algorithm by using a private key to obtain a second character string; and combines the URI, the random number, the control point identifier, and the second character string to obtain a first character string and sends the first character string to the UPnP media player, so that the media player uses the first character string as to-be-verified information, so that the UPnP media player may carry the to-be-verified information in a play request message and send it to the UPnP media server, so that the UPnP media server verifies the to-be-verified information by using preset verification information, which overcomes the defect in the prior
  • FIG. 4 is a flowchart of yet another embodiment of a media resource access control method according to the present invention. As shown in FIG. 4 , the method of this embodiment includes the following.
  • Step 401 The UPnP media server receives a media resource acquisition request sent by a UPnP media player, where the media resource acquisition request includes to-be-verified information.
  • the UPnP media player may execute the technical solution of the method embodiment as shown in FIG. 3 , an implementation principle of which is similar and is not described herein again.
  • Step 402 The UPnP media server decrypts an encrypted character string in the to-be-verified information by using a public key to obtain a character string after decryption, and performs a hash algorithm on the control point identifier, the random number, and the URI in the to-be-verified information to obtain a character string acquired by the hash algorithm.
  • Step 403 The UPnP media server determines whether the character string acquired by the hash algorithm and the character string after the decryption are consistent, and if they are consistent, verifies whether the control point corresponding to the control point identifier has permission to access a media resource corresponding to the URI, and if the verification is passed, sends the media resource corresponding to the URI to the UPnP media resource player.
  • a UPnP media server receives a media resource acquisition request sent by a UPnP media player, where the media resource acquisition request includes to-be-verified information; decrypts an encrypted character string in the to-be-verified information by using a public key to obtain a character string after decryption and performs a hash algorithm on a control point identifier, a random number, and a URI in the to-be-verified information to obtain a character string acquired by the hash algorithm; and determines whether the character string acquired by the hash algorithm and the character string after the decryption are consistent and if they are consistent, verifies whether the control point corresponding to the control point identifier has permission to access a media resource corresponding to the URI, and if the verification is passed, sends the media resource corresponding to the URI to the UPnP media player, which overcomes the defect in the prior art that other control points may guess or intercept a URI on the media server and may easily steal a protected media resource on the media
  • FIG. 5 is a diagram of a system architecture of an environment for implementing a media resource access control method according to the present invention.
  • the system includes: a control point 11, a UPnP media player 12, and a UPnP media server 13, where the control point 11 includes a device such as a cell phone and a television remote control; the UPnP media player 12 includes a device such as a television (Television; TV for short); and the UPnP media server 13 includes a device such as a personal computer (Personal Computer; PC for short).
  • the control point 11 includes a device such as a cell phone and a television remote control
  • the UPnP media player 12 includes a device such as a television (Television; TV for short)
  • the UPnP media server 13 includes a device such as a personal computer (Personal Computer; PC for short).
  • FIG. 6 is a signaling diagram of an embodiment of a media resource access control method according to the present invention.
  • the method of this embodiment includes the following.
  • Step 501 A control point establishes a security channel with a UPnP media server.
  • Step 502 The control point sends a media resource browse request or a media resource query request to the UPnP media server.
  • Step 503 The UPnP media server determines whether the control point has access permission, and if it is determined that it has the access permission, sends media resource information to the control point.
  • Step 504 The control point selects a URI from the media resource information and generates a password.
  • Step 505 The control point sends the URI and the password to the UPnP media server.
  • Step 506 The UPnP media server determines whether the control point has permission to access a media resource corresponding to the URI, and if it determined that the control point has the permission to access the media resource corresponding to the URI, sets the password and the URI as preset verification information, and sends a permission pass message to the UPnP media server.
  • Step 507 The control point receives the permission pass message and then establishes a security channel with the UPnP media player.
  • Step 508 The control point sends the URI and the password to the UPnP media player.
  • Step 509 The UPnP media player sets the URI and the password as to-be-verified information and binds the control point and a current play behavior.
  • Step 510 The UPnP media player carries the to-be-verified information in a media resource acquisition request and sends it to the UPnP media server.
  • the UPnP media player carries the to-be-verified information in a media resource acquisition request in an HTTP or HTTP GET manner and sends it to the UPnP media server.
  • Step 511 The UPnP media server receives the media resource acquisition request and determines whether the password and the URI in the to-be-verified information and the password and the URI in the preset to-be-verified information are consistent, and if they are consistent, sends the media resource corresponding to the URI to the UPnP media player.
  • Step 512 The UPnP media player plays the received media resource.
  • control point may further generate a policy and a user name, where the policy may be a character string in the extensible markup language (Extensible Markup Language; XML for short) format, used to stipulate a manner of using the password, for instance: the user name and the password are valid for once, or the using time of the password and the user name is restricted.
  • a TransmitParameters()Action may be added to the standard, as shown in Table 1, the parameters of which are: URI, UserName, Password, and Policy. Then, the control point may send the URI, the user name, the password, and the policy to the UPnP media server in a form of an Action parameter through the TransmitParameters()Action.
  • the TransmitParameters parameter definition may be as shown in Table 1: Table 1 Parameter Direction Description URI Enter (IN) URI UserName IN User name Password IN Password Policy IN Policy corresponding to the user name and the password
  • URI refers to a URI selected by the control point, the parameter type of which is a character string, used to indicate a location of the media resource
  • UserName refers to a user name generated by the control point, the parameter type of which is a character string
  • Password refers to a password generated by the control point, the parameter type of which is a character string
  • Policy refers to a policy generated by the control point, which may be a character string in the XML format.
  • FIG. 7 is a signaling diagram of another embodiment of a media resource access control method according to the present invention.
  • the method of this embodiment includes the following.
  • Step 601 A control point establishes a security channel with a UPnP media server.
  • Step 602 The control point sends a media resource browse request or a media resource query request to the UPnP media server.
  • Step 603 The UPnP media server determines whether the control point has access permission, and if it has the access permission, sends media resource information corresponding to the control point to the control point.
  • Step 604 The control point selects a URI and a media resource content identifier from the media resource information and acquires a UPnP media player identifier.
  • Step 605 The control point sends the media resource content identifier and the UPnP media player identifier to the UPnP media server.
  • Step 606 The UPnP media server determines whether the control point has permission to access a media resource corresponding to the media resource content identifier, and if the control point has the permission to access the media resource corresponding to the media resource content identifier, sets the UPnP media player identifier and the media resource content identifier as preset verification information, and sends a permission pass message to the control point.
  • Step 607 The control point establishes a security channel with the UPnP media player according to the permission pass message.
  • Step 608 The control point sends the URI to the UPnP media player through the security channel.
  • Step 609 The UPnP media player sets the URI and the UPnP media player identifier of itself as to-be-verified information and binds the control point and a current play behavior.
  • Step 610 The UPnP media player carries the to-be-verified information in a media resource acquisition request and sends it to the UPnP media server.
  • the UPnP media player carries the to-be-verified information in the media resource acquisition request in a hyper text transfer protocol (Hyper Text Transfer Protocol; HTTP for short) or an HTTP secure (Hypertext Transfer Protocol over Secure Socket Layer; HTTPS for short) GET manner and sends it to the UPnP media server.
  • HTTP Hyper Text Transfer Protocol
  • HTTP secure HTTP secure
  • HTTPS Hypertext Transfer Protocol over Secure Socket Layer
  • Step 611 The UPnP media server receives the media resource acquisition request and acquires the media resource content identifier corresponding to the URI in the to-be-verified information and replaces the URI in the to-be-verified information with the media resource content identifier; and determines whether the media resource content identifier and the UPnP media player identifier in the preset verification information are consistent with the media resource content identifier and the UPnP media player identifier in the to-be-verified information after the replacement, and if they are consistent, sends the media resource content identifier or the media resource corresponding to the URI to the UPnP media server.
  • Step 612 The UPnP media player displays the received media resource.
  • control point may further generate a policy and send the policy to the UPnP media server.
  • the policy may be a character string in the XML format, used to stipulate a manner of using the UPnP media player identifier, for instance, the UPnP media player identifier is valid for once, or the using time of the UPnP media player identifier is restricted.
  • a TransmitParameters()Action may be added to the standard, as shown in Table 3, the parameters of which are: Media resource content ID, PresentationDeviceID, and Policy. Then, the control point may send the media resource content identifier, the UPnP media player identifier, and the policy to the UPnP media server in the form of an Action parameter through the TransmitParameters()Action.
  • the TransmitParameters parameter definition may be as shown in Table 2: Table 2 Parameter Direction Description Media resource content ID IN Selected media resource content identifier PresentationDeviceID IN UPnP media player identifier Policy IN Policy corresponding to the UPnP media player identifier
  • Media resource content ID refers to a media resource content ID selected by the control point, the parameter type of which is a character string, used to indicate a media resource
  • PresentationDeviceID refers to a UPnP media player identifier specified by the control point, the parameter type of which is a character string
  • Policy refers to a policy generated by the control point, which may be a character string in the XML format.
  • FIG. 8 is a signaling diagram of still another embodiment of a media resource access control method according to the present invention.
  • the method of this embodiment includes the following.
  • Step 701 A control point establishes a security channel with a UPnP media server.
  • Step 702 The control point sends a media resource browse request or a media resource query request to the UPnP media server.
  • Step 703 The UPnP media server determines whether the control point has access permission, and if it has the access permission, sends media resource information corresponding to the control point the control point.
  • Step 704 The control point selects a URI from the media resource information.
  • Step 705 The control point sends the URI to the UPnP media server.
  • Step 706 The UPnP media server determines whether the control point has permission to access the URI, and if the control point has the permission to access the URI, generates a password, and sets the password and the URI as preset verification information.
  • Step 707 The UPnP media server returns a permission pass message to the control point, where the permission pass message includes the password.
  • Step 708 The control point establishes a security channel with the UPnP media player according to the permission pass message.
  • Step 709 The UPnP media player sends the password and the URI through the security channel to the UPnP media player.
  • Step 710 The UPnP media player sets the URI and the password as to-be-verified information and binds a control point identifier and a current play behavior.
  • Step 711 The UPnP media player carries the to-be-verified information in a media resource acquisition request and sends it to the UPnP media server.
  • the UPnP media player carries the to-be-verified information in a media resource acquisition request in an HTTP or HTTPS GET manner and sends it to the UPnP media server.
  • Step 712 The UPnP media server receives the media resource acquisition request and determines whether the URI and the password in the to-be-verified information and the URI and the password in the preset to-be-verified information are consistent, and if they are consistent, sends the media resource corresponding to the URI to the UPnP media player.
  • Step 713 The UPnP media player displays the received media resource.
  • the UPnP media server generates a password and a user name and sends the password and the user name to the control point, the specific implementation manner of which may be that: If in a newly added TransmitParameters()Action, the user name and the password of the UPnP media server are null, it indicates that the control point requests the user name and the password from the UPnP media server, and the UPnP media server may firstly determine whether the control point has permission to access the media resource corresponding to the URI, and if the control point has the permission to access the media resource corresponding to the URI, add a RespondTransmitParameters()Action to a standard, as shown in Table 3, the parameters of which are UserName, Password, and Status. Specifically, the RespondTransmitParameters parameter definition is as shown in Table 3: Table 3 Parameter Direction Type Description Status IN boolean Control point's access permission towards a URI UserName IN string User name Password IN string Password
  • UserName is used to indicate the user name generated by the UPnP media server, the parameter type of which is a character string, and if the control point does not has the permission to access the URI, UserName is null (NULL);
  • Password is used to indicate the password generated by the UPnP media server, the parameter type of which is a character string, and if the control point does not have the permission to access the media resource corresponding to the URI, the Password is NULL.
  • FIG. 9 is a signaling diagram of yet another embodiment of a media resource access control method according to the present invention.
  • the method of this embodiment includes the following.
  • Step 801 A control point establishes a security channel with a UPnP media server.
  • Step 802 The control point sends a media resource browse request or a media resource query request to the UPnP media server.
  • Step 803 The UPnP media server determines whether the control point has access permission, and if it has the access permission, sends media resource information corresponding to a control point identifier the control point.
  • Step 804 The control point selects a URI from the media resource information and generates a random number, and then performs a hash algorithm on the URI, the control point identifier of the control point, and the random number, encrypts a character string acquired by the hash algorithm by using a preconfigured private key to obtain a second character string, and combines the URI, the control point identifier, the random number, and the second character string to obtain a first character string.
  • Step 805 A control point establishes a security channel with a UPnP media player.
  • Step 806 The control point sends the first character string to the UPnP media player through the security channel.
  • Step 807 The UPnP media player sets the first character string as to-be-verified information and binds the control point and a current play behavior.
  • Step 808 The UPnP media player carries the to-be-verified information in a media resource acquisition request and sends it to the UPnP media server.
  • the UPnP media player carries the to-be-verified information in a media resource acquisition request in an HTTP or HTTPS GET manner and sends it to the UPnP media server.
  • Step 809 The UPnP media server receives the media resource acquisition request, decrypts an encrypted character string in the to-be-verified information by using a preset public key to obtain the character string after the decryption, and performs the hash algorithm on the URI, the control point identifier of the control point, and the random number in the to-be-verified information to obtain a character string after the hash algorithm, and determines whether the character string after the hash algorithm and the character string after the decryption are consistent, and if they are consistent, verifies whether the control point corresponding to the control point identifier has the permission to access a media resource corresponding to the URI, and if it has the access permission, sends the media resource corresponding to the URI to the UPnP media server.
  • Step 810 The UPnP media server plays the received media resource.
  • FIG. 10 is a schematic structural diagram of an embodiment of a UPnP media server according to the present invention.
  • the UPnP media server of this embodiment includes: a receiving and sending module 21, a preset verification information acquisition module 22, and an verification module 23, where the receiving and sending module 21 is configured to receive a media resource identifier sent by a control point; the preset verification information acquisition module 22 is configured to acquire preset verification information corresponding to the media resource identifier; the receiving and sending module 21 is configured to receive a media resource acquisition request sent by a UPnP media player, where the media resource acquisition request contains to-be-verified information; the verification module 23 is configured to verify the to-be-verified information by using the preset verification information; and the receiving and sending module 21 is further configured to: if the verification of the verification module 23 is passed, send a media resource corresponding to the media resource identifier to the UPnP media player.
  • the UPnP media server of this embodiment may implement the technical solution of the method embodiment as shown in FIG. 1 , an implementation principle of which is similar and is not described herein again.
  • a UPnP media server receives a media resource identifier sent by a control point and acquires preset verification information corresponding to the media resource identifier; receives a media resource acquisition request sent by a UPnP media player, where the media resource acquisition request contains to-be-verified information; and verifies the to-be-verified information by using the preset verification information, and if the verification is passed, sends a media resource corresponding to the media resource identifier to the UPnP media server, which overcomes a defect that in the prior art that other control points may guess or intercept a URI on a media server and may easily steal a protected media resource on the media server, thereby ensuring media resource security.
  • the preset verification information acquisition module 22 includes: a first determining unit and a first preset verification information acquisition unit, where the first determining unit is configured to determine whether the control point has permission to access the media resource corresponding to the media resource identifier; and the first preset verification information acquisition unit is configured to generate, if the first determining unit determines that the control point has the permission to access the media resource corresponding to the media resource identifier, a password, and set the password and the media resource identifier as the preset verification information.
  • the preset verification information acquisition module 22 includes: a second determining unit and a second preset verification information acquisition unit, where the second determining unit is configured to determine whether the control point has permission to access the media resource corresponding to the media resource identifier; and the second preset verification information acquisition unit is configured to set, if the second determining unit determines that the control point has the permission to access the media resource corresponding to the media resource identifier, the UPnP media player identifier and the media resource identifier as preset verification information.
  • the preset verification information acquisition module 22 includes: a third determining unit and a third preset verification information acquisition unit, where the third determining unit is configured to determine whether the control point has permission to access the media resource corresponding to the media resource identifier; and the third preset verification information acquisition unit is configured to set, if the third determining unit determines that the control point has the permission to access the media resource corresponding to the media resource identifier, a password and the media resource identifier as the preset verification information, where the password is a password generated by the control point.
  • the media resource identifier is a media resource content identifier and/or a URI.
  • the verification module 23 includes: a processing unit and an verification unit, where the processing unit is configured to acquire a media resource content identifier corresponding to a URI in the to-be-verified information and replace the URI in the to-be-verified information with the media resource content identifier; and the verification unit is configured to verify, by using the preset verification information, the to-be-verified information after the replacement.
  • the receiving and sending module 21 is further configured to receive a media resource browse request or a media resource query request sent by the control point and return media resource information to the control point, so that the control point selects a media resource identifier from the media resource information.
  • FIG. 11 is a schematic structural diagram of an embodiment of a UPnP media player according to the present invention.
  • the UPnP media player of this embodiment includes: a to-be-verified information acquisition module 31 and a sending module 32, where the to-be-verified information acquisition module 31 is configured to acquire to-be-verified information; and the sending module 32 is configured to send a media play request carrying the to-be-verified information to a UPnP media server, so that the UPnP media server verifies the to-be-verified information by using preset verification information.
  • the UPnP media player of this embodiment may implement the technical solution of the method embodiment as shown in FIG. 2 , an implementation principle of which is similar and is not described herein again.
  • a UPnP media player acquires to-be-verified information and sends a media resource acquisition request carrying the to-be-verified information to a UPnP media server, so that the UPnP media server verifies the to-be-verified information by using preset verification information, which overcomes the defect in the prior art that other control points may guess or intercept a URI on the media server and may easily steal a protected media resource on the media server, thereby ensuring media resource security.
  • the UPnP media player includes: a security channel establishing module, configured to establish a security channel with a control point.
  • the to-be-verified information acquisition module 31 at least includes one of the following modules:
  • FIG. 12 is a schematic structural diagram of an embodiment of a control point according to the present invention.
  • the control point of this embodiment includes: a receiving and sending module 41, a URI selection module 42, a random number generation module 43, a second character string acquisition module 44, and a first character string acquisition module 45, where the receiving and sending module 41 is configured to send a media resource browse request or a media resource query request and receive media resource information returned by a UPnP media server; the URI selection module 42 is configured to select a URI from the media resource information; the random number generation module 43 is configured to generate a random number; the second character string acquisition module 44 is configured to perform a hash algorithm on the URI, the random number, and a control point identifier of the control point and encrypt a character string acquired by the hash algorithm by using a private key to obtain a second character string; the first character string acquisition module 45 is configured to combine the URI, the random number, the control point identifier, and the second character string to obtain
  • control point of this embodiment may implement the technical solution of the method embodiment as shown in FIG. 3 , an implementation principle of which is similar and is not described herein again.
  • a control point sends a media resource browse request or a media resource query request to a UPnP media server and receives media resource information returned by the UPnP media server; selects a URI from the media resource information and generates a random number; performs a hash algorithm on the URI, the random number, and the control point identifier and encrypts a character string acquired by the hash algorithm by using a private key to obtain a second character string; and combines the URI, the random number, the control point identifier, and the second character string to obtain a first character string and sends the first character string to the UPnP media player, so that the media player uses the first character string as to-be-verified information; the UPnP media player may carry the to-be-verified information in a play request message and send it to the UPnP media server, so that the UPnP media server verifies the to-be-verified information by using preset verification information, which overcomes the defect in the prior art that
  • FIG. 13 is a schematic structural diagram of an embodiment of a UPnP media server according to the present invention.
  • the UPnP media server of this embodiment includes: a receiving and sending module 51, a character string processing module 52, a determining module 53, and an verification module 54, where the receiving and sending module 51 is configured to receive a media resource acquisition request sent by a UPnP media player, where the media resource acquisition request includes to-be-verified information; the character string processing module 52 is configured to decrypt an encrypted character string in the to-be-verified information by using a public key to obtain a character string after the decryption, and perform a hash algorithm on a control point identifier, a random number, and a URI in the to-be-verified information to obtain a character string acquired by the hash algorithm; the determining module 53 is configured to determine whether the character string acquired by the hash algorithm and the character string after the decryption are consistent; the verification module 54 is configured to: if the determining
  • the UPnP media server of this embodiment may implement the technical solution of the method embodiment as shown in FIG. 4 , an implementation principle of which is similar and is not described herein again.
  • a UPnP media server receives a media resource acquisition request sent by a UPnP media player, where the media resource acquisition request includes to-be-verified information; decrypts an encrypted character string in the to-be-verified information by using a public key to obtain a character string after decryption and performs a hash algorithm on a control point identifier, a random number, and a URI in the to-be-verified information to obtain a character string acquired by the hash algorithm; and determines whether the character string acquired by the hash algorithm and the character string after the decryption are consistent, and if they are consistent, verifies whether the control point corresponding to the control point identifier has permission to access a media resource corresponding to the URI, and if the verification is passed, sends the media resource corresponding to the URI to the UPnP media player, which overcomes the defect in the prior art that other control points may guess or intercept a URI on the media server and may easily steal a protected media resource on the
  • the present invention provides a media resource access control system, including: a control point, a UPnP media server, and a UPnP media player, where the UPnP media server may be the UPnP media server as shown in the embodiment of FIG. 10 , and the UPnP media player may be the UPnP media player as shown in the embodiment of FIG. 11 .
  • the present invention further provides a media resource access control system, including: a control point, a UPnP media server, and a UPnP media player, where the control point may be the control point as shown in the embodiment of FIG. 12 , the UPnP media server may be the UPnP media server as shown in FIG. 13 , and the UPnP media player may be the UPnP media player as shown in FIG. 11 .
  • a control point may be the control point as shown in the embodiment of FIG. 12
  • the UPnP media server may be the UPnP media server as shown in FIG. 13
  • the UPnP media player may be the UPnP media player as shown in FIG. 11 .
  • the foregoing program may be stored in a computer readable storage medium.
  • the foregoing storage medium may be any medium capable of storing program codes, such as a ROM, a RAM, a magnetic disk, or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Automation & Control Theory (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)
EP12811616.7A 2011-07-11 2012-07-03 Zugangssteuerungsverfahren für medienressourcen und vorrichtung Active EP2713547B1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110193031.XA CN102882830B (zh) 2011-07-11 2011-07-11 媒体资源访问控制方法和设备
PCT/CN2012/078111 WO2013007154A1 (zh) 2011-07-11 2012-07-03 媒体资源访问控制方法和设备

Publications (3)

Publication Number Publication Date
EP2713547A1 true EP2713547A1 (de) 2014-04-02
EP2713547A4 EP2713547A4 (de) 2014-11-12
EP2713547B1 EP2713547B1 (de) 2018-09-05

Family

ID=47483979

Family Applications (1)

Application Number Title Priority Date Filing Date
EP12811616.7A Active EP2713547B1 (de) 2011-07-11 2012-07-03 Zugangssteuerungsverfahren für medienressourcen und vorrichtung

Country Status (4)

Country Link
US (1) US9152804B2 (de)
EP (1) EP2713547B1 (de)
CN (1) CN102882830B (de)
WO (1) WO2013007154A1 (de)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103324883B (zh) * 2013-06-24 2015-07-29 腾讯科技(深圳)有限公司 一种多媒体播放终端的认证方法、终端、服务器以及系统
CN104426888B (zh) * 2013-09-05 2017-11-28 上海斐讯数据通信技术有限公司 一种数字媒体服务器限制访问的方法、服务器及系统
CN104135367B (zh) * 2014-05-27 2017-11-03 汉柏科技有限公司 一种UPnP接入安全认证方法及装置
US10455292B2 (en) * 2015-06-01 2019-10-22 Arris Enterprises Llc Dynamic channel list generation for content delivery over DLNA
CN105100082A (zh) * 2015-07-02 2015-11-25 惠州Tcl移动通信有限公司 云终端接入家庭云系统的方法、系统及云接入控制设备
CN107104993A (zh) * 2016-02-19 2017-08-29 中国移动通信集团公司 一种统一资源标识符的传输、获得方法及装置
US11722456B2 (en) * 2016-07-01 2023-08-08 Intel Corporation Communications in internet-of-things devices
CN107465660B (zh) * 2017-06-30 2019-11-15 武汉斗鱼网络科技有限公司 一种视频流地址鉴权方法及装置
US11870801B2 (en) * 2021-01-27 2024-01-09 Paypal, Inc. Protecting computer system end-points using activators

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050283618A1 (en) * 2004-06-16 2005-12-22 Lg Electronics Inc. Managing access permission to and authentication between devices in a network
US20080092211A1 (en) * 2006-10-13 2008-04-17 Microsoft Corporation UPNP authentication and authorization

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7254836B2 (en) 2003-10-23 2007-08-07 Microsoft Corporation Protected media path and refusal response enabler
US7668939B2 (en) * 2003-12-19 2010-02-23 Microsoft Corporation Routing of resource information in a network
KR20060091870A (ko) * 2005-02-16 2006-08-22 엘지전자 주식회사 사용자 인증 서비스를 제공하는 유피엔피 네트워크 시스템및 방법
EP1788773A1 (de) * 2005-11-18 2007-05-23 Alcatel Lucent Verfahren und Vorrichtungen zur Anforderung eines Medienpostens und zur Voraberstellung eines Tokens

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050283618A1 (en) * 2004-06-16 2005-12-22 Lg Electronics Inc. Managing access permission to and authentication between devices in a network
US20080092211A1 (en) * 2006-10-13 2008-04-17 Microsoft Corporation UPNP authentication and authorization

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
"FM 22-6 FIELD MANUAL GUARD DUTY", , 1 September 1971 (1971-09-01), XP055143840, Retrieved from the Internet: URL:https://militaryscience.usu.edu/files/ uploads/Cadet_Toolbox/Gaurd_Duty_FM_22-6.p df [retrieved on 2014-10-01] *
Anonymous: "Digital signature - Wikipedia, the free encyclopedia", , 13 June 2011 (2011-06-13), XP055144273, Retrieved from the Internet: URL:http://en.wikipedia.org/w/index.php?title=Digital_signature&oldid=434130054 [retrieved on 2014-10-03] *
John Ritchie ET AL: "UPnP AV Architecture:2 For UPnP Version 1.0", , 31 December 2010 (2010-12-31), XP055032201, Retrieved from the Internet: URL:http://upnp.org/specs/av/UPnP-av-AVArchitecture-v2.pdf [retrieved on 2012-07-09] *
See also references of WO2013007154A1 *
THIAGO SALES ET AL: "A UPnP extension for enabling user authentication and authorization in pervasive systems", JOURNAL OF THE BRAZILIAN COMPUTER SOCIETY, vol. 16, no. 4, 7 October 2010 (2010-10-07), pages 261-277, XP055143475, ISSN: 0104-6500, DOI: 10.1007/s13173-010-0022-2 *

Also Published As

Publication number Publication date
CN102882830A (zh) 2013-01-16
US20140115721A1 (en) 2014-04-24
CN102882830B (zh) 2016-06-08
EP2713547A4 (de) 2014-11-12
US9152804B2 (en) 2015-10-06
WO2013007154A1 (zh) 2013-01-17
EP2713547B1 (de) 2018-09-05

Similar Documents

Publication Publication Date Title
EP2713547B1 (de) Zugangssteuerungsverfahren für medienressourcen und vorrichtung
CN107251035B (zh) 账户恢复协议
EP3073699B1 (de) System und verfahren zur steuerung des gemeinsamen zugangs zu intelligenten vorrichtungen
US10009321B2 (en) Method performed by at least one server for processing a data packet from a first computing device to a second computing device to permit end-to-end encryption communication
KR101289530B1 (ko) 스마트폰의 관리하에서 스마트폰의 베어러 및 서버 독립 부모 제어를 위한 방법 및 장치
WO2017028593A1 (zh) 网络接入设备接入无线网络接入点的方法、网络接入设备、应用程序服务器和非易失性计算机可读存储介质
US8738910B2 (en) Method and arrangement for enabling play-out of media
US20130297936A1 (en) Method, device, and system for securely sharing media content from a source device
US12126617B2 (en) Method and system for granting remote access to an electronic device
CN103118022B (zh) 一种无密码异端登陆验证方法
US9160720B2 (en) Digital rights management of streaming contents and services
TW201417546A (zh) 即時通信方法和系統
CN108111497A (zh) 摄像机与服务器相互认证方法和装置
CA2938166C (en) Method and system for protecting data using data passports
CN104735484A (zh) 一种播放视频的方法及装置
US20240137221A1 (en) Implementation of one-touch login service
EP3602363A1 (de) Bypass-mobilvorrichtungen zur sicheren medienübertragung
US11743356B2 (en) Email notification system
US8600058B2 (en) Generation of self-certified identity for efficient access control list management
US11743035B2 (en) Methods, mediums, and systems for verifying devices in an encrypted messaging system
US11658955B1 (en) Methods, mediums, and systems for verifying devices in an encrypted messaging system
US11848930B1 (en) Methods, mediums, and systems for verifying devices in an encrypted messaging system
Schulz et al. d 2 Deleting Diaspora: Practical attacks for profile discovery and deletion
US8769280B2 (en) Authentication apparatus and method for non-real-time IPTV system
Alsaffar et al. IPTV Service Framework Based on Secure Authentication and Lightweight Content Encryption for Screen‐Migration in Cloud Computing

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20131227

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

DAX Request for extension of the european patent (deleted)
A4 Supplementary search report drawn up and despatched

Effective date: 20141014

RIC1 Information provided on ipc code assigned before grant

Ipc: H04L 9/30 20060101ALI20141008BHEP

Ipc: H04L 29/06 20060101ALI20141008BHEP

Ipc: H04L 12/28 20060101ALI20141008BHEP

Ipc: H04L 9/32 20060101AFI20141008BHEP

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20161212

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: HUAWEI DEVICE (DONGGUAN) CO., LTD.

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: HUAWEI DEVICE CO., LTD.

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

INTG Intention to grant announced

Effective date: 20180307

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 1039143

Country of ref document: AT

Kind code of ref document: T

Effective date: 20180915

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602012050743

Country of ref document: DE

REG Reference to a national code

Ref country code: NL

Ref legal event code: FP

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180905

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180905

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180905

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181205

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181205

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181206

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180905

REG Reference to a national code

Ref country code: DE

Ref legal event code: R081

Ref document number: 602012050743

Country of ref document: DE

Owner name: HUAWEI DEVICE CO., LTD., DONGGUAN, CN

Free format text: FORMER OWNER: HUAWEI DEVICE CO., LTD., SHENZHEN, GUANGDONG, CN

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 1039143

Country of ref document: AT

Kind code of ref document: T

Effective date: 20180905

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180905

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180905

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180905

REG Reference to a national code

Ref country code: NL

Ref legal event code: HC

Owner name: HUAWEI DEVICE (SHENZHEN) CO., LTD.; CN

Free format text: DETAILS ASSIGNMENT: CHANGE OF OWNER(S), CHANGE OF OWNER(S) NAME; FORMER OWNER NAME: HUAWEI DEVICE CO., LTD.

Effective date: 20190115

Ref country code: NL

Ref legal event code: PD

Owner name: HUAWEI DEVICE CO., LTD.; CN

Free format text: DETAILS ASSIGNMENT: CHANGE OF OWNER(S), ASSIGNMENT; FORMER OWNER NAME: HUAWEI DEVICE (SHENZHEN) CO., LTD.

Effective date: 20190115

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180905

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180905

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180905

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180905

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190105

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180905

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180905

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180905

RAP2 Party data changed (patent owner data changed or rights of a patent transferred)

Owner name: HUAWEI DEVICE (SHENZHEN) CO., LTD.

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180905

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190105

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180905

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602012050743

Country of ref document: DE

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180905

26N No opposition filed

Effective date: 20190606

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180905

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180905

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20190703

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180905

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20190731

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190703

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190703

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190731

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190731

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190731

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190731

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190703

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180905

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20120703

Ref country code: MT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180905

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180905

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: NL

Payment date: 20230614

Year of fee payment: 12

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20230531

Year of fee payment: 12